CVE-2026-30823

FlowiseAI · Flowise

A high-severity vulnerability in the Flowise LLM flow builder could allow attackers to compromise customized large language model flows.

Executive summary

Flowise contains a high-severity security vulnerability that could lead to the unauthorized manipulation or compromise of LLM-based application workflows.

Vulnerability

The vulnerability affects the Flowise drag-and-drop interface used for building LLM flows. Based on the CVSS score of 8.8, the flaw likely permits an attacker to intercept or modify the logic of AI applications.

Business impact

Successful exploitation could lead to "prompt injection" at scale, data exfiltration from connected vector databases, or the hijacking of AI-driven business processes. The CVSS score of 8.8 highlights the significant risk to the integrity of AI infrastructure.

Remediation

Immediate Action: Update Flowise to the latest version immediately to resolve the identified security flaw.

Proactive Monitoring: Audit LLM flow configurations for unauthorized changes and monitor API logs for unusual request patterns.

Compensating Controls: Ensure that Flowise is deployed within a secure network perimeter and that all users are authenticated via a centralized identity provider.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Apply the vendor's security updates without delay. AI orchestration tools often have broad access to internal data sources, making their security paramount to the overall safety of the organization's data.